Chapter 14: Types of Security Technologies


“It is true greatness to have in one the frailty of a man and the security of a god.”

—Seneca (3 B.C.–65 A.D.)

Overview

You are undoubtedly aware by now that the technology revolution is here to stay. In fact, many of the things you take for granted today (e-mail, cell phones, PDAs) were unimaginable just a few short years ago. This rapid growth of technology, where prices drop while consumer value increases, is historically unprecedented. A frequently asked question is, “How exactly did we get here?”

One of the fundamental enablers of this change, and of the increase in productivity, is the shift to rapid product development cycles—particularly in the case of software. Feature-rich applications that were impossible to develop and deploy in the recent past are now conceived of and deployed with lightning speed. The increased intensity of business competition has driven this demand for faster and better products made available in the marketplace. In the future, the stakes will become even greater, as competition in every sector continues to escalate. Still, entrepreneurs and visionaries will press on in spite of the risks, and deliver new technologies in better ways.




Electronic Commerce (Networking Serie 2003)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors: Pete Loshin

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net